enforce-https
Default Severity: critical
Explanation
Plain HTTP is unencrypted and human-readable. This means that if a malicious actor was to eavesdrop on your connection, they would be able to see all of your data flowing back and forth.
You should use HTTPS, which is HTTP over an encrypted (TLS) connection, meaning eavesdroppers cannot read your traffic.
Possible Impact
CloudFront is available through an unencrypted connection
Suggested Resolution
Only allow HTTPS for CloudFront distribution communication
Insecure Example
The following example will fail the aws-cloudfront-enforce-https check.
resource "aws_cloudfront_distribution" "bad_example" {
default_cache_behavior {
viewer_protocol_policy = "allow-all"
}
}
Secure Example
The following example will pass the aws-cloudfront-enforce-https check.
resource "aws_cloudfront_distribution" "good_example" {
default_cache_behavior {
viewer_protocol_policy = "redirect-to-https"
}
}